CFP last date
20 January 2025
Reseach Article

Development of an Improved Intrusion Detection based Secured Robust Header Compression Technique

by Malachi C. Egbugha, I. J. Umoh, A. M. S. Tekanyi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 161 - Number 7
Year of Publication: 2017
Authors: Malachi C. Egbugha, I. J. Umoh, A. M. S. Tekanyi
10.5120/ijca2017913234

Malachi C. Egbugha, I. J. Umoh, A. M. S. Tekanyi . Development of an Improved Intrusion Detection based Secured Robust Header Compression Technique. International Journal of Computer Applications. 161, 7 ( Mar 2017), 22-29. DOI=10.5120/ijca2017913234

@article{ 10.5120/ijca2017913234,
author = { Malachi C. Egbugha, I. J. Umoh, A. M. S. Tekanyi },
title = { Development of an Improved Intrusion Detection based Secured Robust Header Compression Technique },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2017 },
volume = { 161 },
number = { 7 },
month = { Mar },
year = { 2017 },
issn = { 0975-8887 },
pages = { 22-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume161/number7/27161-2017913234/ },
doi = { 10.5120/ijca2017913234 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:06:30.764963+05:30
%A Malachi C. Egbugha
%A I. J. Umoh
%A A. M. S. Tekanyi
%T Development of an Improved Intrusion Detection based Secured Robust Header Compression Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 161
%N 7
%P 22-29
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This research presents the development of an Improved Intrusion Detection Secured RObust Header Compression (IDSROHC) technique for handling brute force attack. The Secured RObust Header Compression (Secured ROHC) was developed to secure internet protocol version six (IPv6) packets against false initial refresh attack by encrypting the cyclic redundancy check field. However, the CRC is only 3-8 bits long, which implies that a malicious node could still attempt a brute force approach, where it sends fake packets with all possible CRC combinations.An IDSROHC was developed using a modified selective watchdog intrusion detection algorithm. A MATLAB graphical user interface was design to aid presentation. IDSROHC was validated with Secured ROHC using throughput and packet delivery success. The results of this work show that IDSROHC produced 4.97% improvement in throughput and 29% improvement in packet delivery success over Secured ROHC.

References
  1. Cheng, B.-N. and S. Moore, Securing RObust Header Compression (ROHC). IEEE Military Communications Conference, MILCOM 2013-2013 2013: p. 1383-1390.
  2. Majanen, M., P. Koskela, and M. Valta, ConstrainedApplicationProtocolProfileforRobustHeaderCompressionFramework, in The Fifth International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies. 2015. p. 47-53.
  3. Cha, H., et al. Improving packet header compression with adaptive sliding window size. in 2015 International Conference on Information Networking (ICOIN). 2015. IEEE.
  4. Chishti, M.A. and A.H. Mir, Survey of Header Compression Techniques over Multiprotocol Label Switching (MPLS). Int. J. Com. Dig. Sys, 2015. 4(2): p. 121-136.
  5. Bow-Nan, C., et al., MANET IP Header Compression. MILCOM 2013-2013 IEEE Military Communicatinos Conference, 2013: p. 494-503.
  6. Sandlund, K., G. Pelletier, and L. Jonsson, The RObust Header Compression (ROHC) Framework Network Working Group Request for Comments: 4996. 2010. p. 1-94.
  7. Gavaskar, S., E. Ramaraj, and R. Surendiran, A Compressed Anti IP Spoofing Mechanism using Cryptography. International Journal of Computer Science and Network Security, 2012. 12(11): p. 137-140.
  8. Can, O. and O.K. Sahingoz, A survey of intrusion detection systems in wireless sensor networks. 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO), 2015, 2015: p. 1-6.
  9. Dua, D. and A. Mishra, Selective Watchdog Technique for Intrusion Detection in Mobile Ad-Hoc Network. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) 2014. 6: p. 1-12.
  10. Rawat, P. and J.-M. Bonnin. Designing a header compression mechanism for efficient use of IP tunneling in wireless networks. in 7th IEEE Consumer Communications and Networking Conference (CCNC). 2010. IEEE.
  11. Shivare, M.R., Y.P. S.Maravi, and S. Sharma, Analysis of Header Compression Techniques for Networks: A Review. International Journal of Computer Applications, 2013. 80: p. pp 14-20.
  12. Jivorasetkul, S., M. Shimamura, and K. Iida. End-to-end header compression over software-defined networks: A low latency network architecture. in 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS) 2012. IEEE.
  13. Madsen, T.K., et al. Design and evaluation of ip header compression for cellular-controlled p2p networks. in IEEE International Conference on Communications, 2007. ICC'07. 2007. IEEE.
  14. Mohamad, I.J., End-to-End QoS Improvement using IPv6 Header Reduction over MPLS. International Journal of Computer Applications, 2013. 80: p. pp27-32.
  15. Hermenier, R., F. Rossetto, and M. Berioli. A simple analytical model for RObust Header Compression in correlated wireless links. in 8th International Symposium on Wireless Communication Systems (ISWCS), 2011 2011. IEEE.
  16. Li, R., et al., Method and device for decoding by using window-based least significant bits in robust header compression U.S. Patent No. 8,418,037. Washington, DC: U.S. Patent and Trademark Office., 2013.
  17. Cheng, B.-N., J. Wheeler, and B. Hung, Internet protocol header compression technology and its applicability on the tactical edge. Communications Magazine, IEEE, 2013. 51(10): p. 58-65.
  18. Batabyal, S. and P. Bhaumik, Mobility models, traces and impact of mobility on opportunistic routing algorithms: A survey. IEEE Communications Surveys & Tutorials, 2015. 17(3): p. 1679-1707.
  19. Pramanik, A., et al. Simulative study of random waypoint mobility model for mobile ad hoc networks. in Communication Technologies (GCCT), 2015 Global Conference on. 2015. IEEE.
  20. Hermenier, R., F. Rossetto, and M. Berioli, On the Behavior of RObust Header Compression U-mode in Channels with Memory. IEEE Transactions on Wireless Communications, 2013. 12(8): p. 3722-3732.
  21. Wang, B., et al. On implementation and improvement of robust header compression in UMTS. in Personal, Indoor and Mobile Radio Communications, 2002. The 13th IEEE International Symposium on. 2011. IEEE.
  22. Osunade, O., A Packet Routing Model for Computer Networks. International Journal of Computer Network and Information Security, 2012. 4(4): p. 13.
  23. Salehin, K.M., et al., Scheme to Measure Packet Processing Time of a Remote Host through Estimation of End-Link Capacity. IEEE TRANSACTIONS ON COMPUTERS, 2013. Vol. X: p. pp 1-14.
  24. Zhang, J., et al. A survey of network traffic generation. in Third International Conference on Cyberspace Technology (CCT 2015). 2015. IET.
  25. Meenakshi, Impact of Network Size on Performance of Wireless Network Topology. International Journal of Advance Research in Computer Science and Management Studies, 2014. 2(9): p. 175-179.
  26. Chauhan, D. and S. Sharma, Addressing the bandwidth issue in end-to-to header compression over ipv6 tunneling mechanism. I.J.Computer and information security, 2015. 9: p. 39-45.
  27. Hermenier, R., F. Rossetto, and M. Berioli, On the Behavior of RObust Header Compression U-mode in Channels with Memory. Wireless Communications, IEEE Transactions on, 2013. 12(8): p. 3722-3732.
Index Terms

Computer Science
Information Sciences

Keywords

IDSROHC Secured ROH Brute force-Attack Throughput Packet delivery Success